US20160007508A1 - Portable mechanical switch for selective deactivation of radio frequency identification circuits - Google Patents

Portable mechanical switch for selective deactivation of radio frequency identification circuits Download PDF

Info

Publication number
US20160007508A1
US20160007508A1 US14/853,938 US201514853938A US2016007508A1 US 20160007508 A1 US20160007508 A1 US 20160007508A1 US 201514853938 A US201514853938 A US 201514853938A US 2016007508 A1 US2016007508 A1 US 2016007508A1
Authority
US
United States
Prior art keywords
electrically conductive
flexible
conductive sheath
electronic device
card
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
US14/853,938
Other versions
US9572292B2 (en
Inventor
Matthew Wilczynski
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
PayPal Inc
Original Assignee
PayPal Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by PayPal Inc filed Critical PayPal Inc
Priority to US14/853,938 priority Critical patent/US9572292B2/en
Publication of US20160007508A1 publication Critical patent/US20160007508A1/en
Assigned to EBAY INC. reassignment EBAY INC. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: WILCZYNSKI, MATTHEW
Assigned to PAYPAL, INC. reassignment PAYPAL, INC. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: EBAY INC.
Application granted granted Critical
Publication of US9572292B2 publication Critical patent/US9572292B2/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H05ELECTRIC TECHNIQUES NOT OTHERWISE PROVIDED FOR
    • H05KPRINTED CIRCUITS; CASINGS OR CONSTRUCTIONAL DETAILS OF ELECTRIC APPARATUS; MANUFACTURE OF ASSEMBLAGES OF ELECTRICAL COMPONENTS
    • H05K9/00Screening of apparatus or components against electric or magnetic fields
    • H05K9/0007Casings
    • H05K9/002Casings with localised screening
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/067Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
    • G06K19/07Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
    • G06K19/073Special arrangements for circuits, e.g. for protecting identification code in memory
    • G06K19/07309Means for preventing undesired reading or writing from or onto record carriers
    • G06K19/07318Means for preventing undesired reading or writing from or onto record carriers by hindering electromagnetic reading or writing
    • G06K19/07327Passive means, e.g. Faraday cages
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/067Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
    • G06K19/07Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
    • G06K19/077Constructional details, e.g. mounting of circuits in the carrier
    • G06K19/07701Constructional details, e.g. mounting of circuits in the carrier the record carrier comprising an interface suitable for human interaction
    • G06K19/07703Constructional details, e.g. mounting of circuits in the carrier the record carrier comprising an interface suitable for human interaction the interface being visual
    • G06K19/07707Constructional details, e.g. mounting of circuits in the carrier the record carrier comprising an interface suitable for human interaction the interface being visual the visual interface being a display, e.g. LCD or electronic ink
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/28Individual registration on entry or exit involving the use of a pass the pass enabling tracking or indicating presence
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/29Individual registration on entry or exit involving the use of a pass the pass containing active electronic elements, e.g. smartcards
    • HELECTRICITY
    • H05ELECTRIC TECHNIQUES NOT OTHERWISE PROVIDED FOR
    • H05KPRINTED CIRCUITS; CASINGS OR CONSTRUCTIONAL DETAILS OF ELECTRIC APPARATUS; MANUFACTURE OF ASSEMBLAGES OF ELECTRICAL COMPONENTS
    • H05K5/00Casings, cabinets or drawers for electric apparatus
    • H05K5/02Details
    • H05K5/0217Mechanical details of casings
    • H05K5/0221Locks; Latches
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C2009/00968Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys shape of the data carrier
    • G07C2009/00976Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys shape of the data carrier card

Definitions

  • Embodiments of the present invention generally relate to security for radio frequency identification (RFID) and, more particularly, to protecting cards having embedded RFID radio frequency for which the protection can be conveniently deactivated yet allows the card to remain visible even while protected.
  • RFID radio frequency identification
  • RFID badges RFID-embedded credit cards such as payWaveTM or PayPassTM credit cards, and other authentication devices using RFID or near field communication (NFC), for example, may sometimes use pouch-like enclosures impregnated with metals to guard against surreptitious duplication or sabotage of their credentials.
  • enclosures may take the form of homemade wallets consisting of tinfoil and duct tape, for example, or more sturdy products made with nylon and steel. While these enclosures can be quite effective, they are often cumbersome and require the user to fully remove and then replace the credential device. This type of protection is also unsuitable for credentials—such as identification badges—that must be worn and displayed visibly even when not being used for electronic authentication.
  • FIG. 1 is a system block diagram illustrating a system in accordance with one or more embodiments of the present invention.
  • FIG. 2 is a perspective view illustrating an apparatus in accordance with an embodiment.
  • FIG. 3 is a perspective view illustrating an apparatus in accordance with an embodiment.
  • FIG. 4 is a cross sectional view, taken along line A-A of FIG. 3 , illustrating an apparatus in accordance with an embodiment.
  • FIG. 5 is a flow chart illustrating a method of providing security for an electronically readable card in accordance with an embodiment.
  • RFID radio frequency identification
  • the authentication device e.g., a credit card or identification (ID) badge
  • visible e.g., visually readable, such as a photo ID badge
  • the protection can be conveniently deactivated by a user, allowing the authentication device or card to be read electronically.
  • RFID-enabled bank credit cards have been the object of some concern because of the readiness with which criminals can “clone” or “skim” them using modified readers similar to those of legitimate merchants and getting near enough to a credit card to coax its response signals.
  • RFID circuits could, for example, enable a skilled social engineer to permanently deactivate an unsuspecting employee's ID badge from a distance and then exploit a power relationship (e.g., posing as a security guard or “helpful” information technology (IT) specialist) to con the employee into revealing other identity information.
  • a power relationship e.g., posing as a security guard or “helpful” information technology (IT) specialist
  • Embodiments may address such scenarios, improving ID badge security by guarding against surreptitious duplication and chip destruction while at the same time preserving other functionality of the card or badge such as visibility of a photo identification affixed to an ID badge.
  • the selective RFID deactivation system that allows the read-protection to be deactivated upon a user's selection of a switch position may allow users to travel freely and securely in the knowledge that, until the user pushes down the deactivation switch, the user's badge is non-readable electronically (while remaining visually readable).
  • an ID badge protected by one embodiment can compensate for unforeseen circumstances, for example, a lack of cautiousness on the part of a user—protecting the user in situations where the user might otherwise inadvertently or guilelessly expose the ID badge to unauthorized electronic reading outside of a secure work environment.
  • a carrying case-like apparatus may allow a user to place an RFID-embedded badge, credit card, or other chip-embedded item (generally referred to as electronically readable authentication device or card) inside the case and selectively enable or disable reading of the card by simply pressing down on a switch (e.g., button, lever, or slider).
  • Activation and deactivation of electronic read-protection for the item may be achieved, in one or more embodiments, by way of a flexible, electrically conductive mesh or sheath that runs along a channel between layers of protective plastic in the case.
  • the mesh may be compressed (moving the mesh to electronically expose the item, allowing the item to be electronically read) whenever the user presses the switch.
  • the mesh or sheath when uncompressed, may act according to the physical principles of a Faraday cage, preventing the electronically readable card from being accessed or read electronically, by surrounding or enclosing the item and obscuring the item from electric fields and electromagnetic radiation.
  • the mesh or sheath may be virtually transparent or at least semi-transparent so that the item remains visible and information on the item—such as an ID photo and text information—can still be seen or read optically.
  • Embodiments may differ from other products for protecting electronically readable cards that are more similar to a conventional wallet and completely cover the chip-embedded card so that it is not visible.
  • Faraday cages are typically rigid rather than flexible, requiring a door-like opening, or flap, to be opened to move objects into and out of the cage.
  • systems and methods provide an envelope or pocket-like case for carrying an electronically readable card, having an electrically conductive, non-opaque sheath that can be moved to cover or expose the electronically readable card and that prevents information on the the card from being electronically read when covered yet still allows the card to be seen, e.g., preserving visual functionality, when covered.
  • the sheath may be a wire mesh that is flexible enough to be compressed to expose the card yet stiff (or rigid) enough to be extended to cover the card and that is transparent enough to allow reading visual information on the surface of the card when covering the card.
  • a system may include: a case having an opening for inserting an authentication device and an inside shaped to accept the authentication device, in which the case allows the authentication device to remain visible when the authentication device is inside the case; and a flexible, electrically conductive sheath inside the case, the sheath having a first position and a second position, and readily moveable between the two positions, such that: in the first position, when the authentication device is inside the case, the electrically conductive sheath encloses the authentication device and the authentication device remains visible through the sheath; and in the second position, the sheath does not enclose the authentication device.
  • a method may include: protecting an electronically readable card from being electronically read while maintaining visual readability of the electronically readable card; mechanically switching off a protection of the electronically readable card for presentation to an electronic card reader; and mechanically switching the protection back on so that the electronically readable card is protected from being electronically read yet is still visually readable.
  • FIG. 1 illustrates a system 100 that may employ methods and devices for improving security of an authentication device 105 , in accordance with one or more embodiments.
  • a user 102 e.g., a consumer using an electronically readable credit card or employee carrying or wearing an ID badge
  • an authentication device 105 e.g., an RFID-embedded badge, credit card, or other chip-embedded or NFC enabled item
  • Reader device 104 may electronically read information from authentication device 105 according to the technology involved, e.g., RFID or NFC.
  • Reader device 104 may include a computing device (e.g., a computer, cell phone, POS terminal, or other electronic device) configured to communicate over a communication network 106 , which may be implemented as a single network or a combination of multiple networks.
  • network 106 may include the Internet as well as phone networks such as Public Switched Telephone Network (PSTN) or one or more intranets, landline networks, wireless networks, or other appropriate types of networks.
  • PSTN Public Switched Telephone Network
  • intranets landline networks
  • wireless networks or other appropriate types of networks.
  • Reader device 104 may communicate via network 106 with a website 108 that may be operated by a commercial entity, such as a security service or a merchant website that is a seller of retail goods, for example
  • website 108 may be a merchant website, may sell goods online, and may communicate with reader device 104 (e.g., a POS terminal) by operating a server 110 (e.g., a computer processor) that presents a website for selling goods.
  • the server 110 may respond to client devices (e.g., client 111 running on reader device 104 ) by communicating over network 106 .
  • Website 108 may also maintain a database 114 and provide user accounts for its customers.
  • Database 114 may provide convenience for customers of the merchant (e.g., merchant website 108 ) by allowing, for example, users to keep their shipping information on file with the merchant so as not to have to re-enter information with every order, or, for example, the merchant may like to offer promotions for users with an account on merchant website 108 .
  • Merchant website 108 may operate a backend server 116 that is limited in its communications over network 106 and may communicate with server 110 and database 114 through a firewall for providing more secure operations than would be possible with server 110 .
  • website 108 may provide a security service that, for example, tracks authentication devices 105 (e.g., authentication device 105 may be an employee ID badge).
  • Website 108 may also communicate (for example, using server 110 ) with a financial service provider (FSP) 120 through FSP server 122 over network 106 .
  • FSP financial service provider
  • website 108 may communicate with FSP 120 in the course of various services offered by FSP 120 to website 108 , such as payment intermediary between customers (e.g., consumer user 102 of merchant website 108 ) and merchant website 108 itself.
  • merchant website 108 may use an application programming interface (API) 112 that allows it to run apps and offer sale of goods in which customers are allowed to make payment through FSP 120 , while consumer user 102 may have an account with FSP 120 that allows consumer user 102 to use the FSP 120 for making payments to sellers that allow use of authentication, authorization, and payment services 124 of FSP 120 as a payment intermediary.
  • Financial service provider services may also include, for example, an online payment service operating between consumers and merchants and may also be a service provided by a financial service provider (FSP)—such as PayPal, Inc. of San Jose, Calif.—in which a user of the service may have an account with the FSP (referred to as an “FSP account”). Also as shown in FIG.
  • FSP financial service provider
  • FSP 120 may provide electronic data storage in the form of database 126 .
  • Database 126 may be used to keep track of user's accounts 128 with FSP 120 , merchant's accounts with FSP 120 , and transactions between customers, merchants, and stores including payments between the various entities, for example.
  • FSP server 122 may execute various application programming interfaces (APIs) that may enable various different types of relationships between FSP 120 and the different parties shown in FIG. 1 .
  • FSP may provide various APIs 125 to its customers such as website 108 (e.g., API 112 ) that enable those websites to implement embodiments of authentication, authorization, and password reset services.
  • FIGS. 2 , 3 , and 4 illustrate a protective device 200 , in accordance with an embodiment, that may used for guarding electronic readability of authentication device 105 shown in FIG. 1 .
  • Authentication device 105 may be a card with an embedded chip, such as an RFID chip or NFC enabled chip or circuit, for example, referred to as a chip-embedded card.
  • authentication device 105 may be referred to as “card 105 ”.
  • FIG. 2 shows a relatively small (e.g., sized to hold a typical credit card, ID badge, or passport) protective device 200 that may include a case 210 or outer shell that encloses a sheath 220 that is moveable to enclose the card 105 , as shown in FIG. 3 , when the card 105 is inside the case 210 .
  • sheath 220 may completely enclose card 105 or may enclose card 105 sufficiently to act as a Faraday cage that may protect card 105 from being electronically read by a card reader, such as card reader 104 or some other, possibly surreptitiously placed or used, card reading device.
  • the size of holes or openings (e.g., any part of the cage's uninterrupted open areas—measured in any dimension or direction) in a Faraday cage may be related to the wavelength of electromagnetic radiation that it is intended for the Faraday cage to block according to a general empirical rule that the size of any opening should be no larger than about 1/10 to 1/20 of the smallest wavelength intended to be blocked.
  • the wavelength is approximately 33 centimeters (cm), so that a Faraday cage with openings for which the maximum dimension of any opening is no greater than about 1.65 cm (based on 1/20 of a wavelength) should be more than sufficient to provide protection from being electronically read at 900 MHz or less for a card enclosed within the Faraday cage (e.g., a card 105 enclosed within a sheath 220 ).
  • case 210 may have an opening 212 for inserting card 105 and the opening 212 may determine—by being more or less perpendicular to the opening 212 —an axis 213 of case 210 , along which card 105 may be inserted into case 210 , as indicated by the arrow in FIG. 2 .
  • Sheath 220 may be collapsible and expandable axially with reference to axis 213 as can be seen by comparison between FIG. 2 and FIG. 3 of the positions of sheath 220 . In a protected, or default, first position, shown in FIG. 3 , sheath 220 may enclose and protect card 105 from being electronically read (but still allow information on card 105 to remain visible or capable of being visually read).
  • sheath 220 may leave enough of card 105 electronically exposed to be electronically readable by a card reading device, such as card reader 104 (as well as still being visible).
  • a button 222 such as a slider, lever, catch, or other mechanism—may be provided for convenient finger operation in moving sheath 220 between its first and second positions.
  • a mechanism may be so arranged (e.g., using spring tension or elasticity of the sheath 220 material itself) that button 222 needs to be held to maintain sheath 220 in the exposed position shown in FIG. 2 so that sheath 220 automatically returns to the default, protected position shown in FIG. 3 when button 222 is released.
  • a mechanism may be so arranged that button 222 catches and remains in the last position selected by a user.
  • case 210 may further include a hole 214 or other suitable attachment point (e.g., for a clip attachment) for attaching the case 210 , for example, to clothing, a lanyard, or a key-ring.
  • the entire sheath 220 assembly (including spring tension or compression) may be inverted so that the sheath 220 is compressed only when a lanyard or similar attachment device is pulled.
  • sheath 220 may be attached to a sliding component of the case 210 , so that sheath 220 compresses in an upward direction (with respect to the orientation of the security badge and the wearer) instead of downward (as seen in FIG. 2 ).
  • sheath 220 may be regarded as a cylinder with cylindrical axis 213 , surrounding card 105 .
  • Sheath 220 may also surround an inner sleeve 224 also regarded as generalized cylinder having cylindrical axis 213 , as shown in cross section in FIG. 4 .
  • Both case 210 and inner sleeve 224 may be made of transparent plastic; case 210 may be made of a harder plastic and inner sleeve 224 may be more flexible.
  • Inner sleeve 224 may be configured so that card 105 may slide into inner sleeve 224 and inner sleeve 224 is surrounded by sheath 220 , which is surrounded by case 210 , so that a space or channel is formed between inner sleeve 224 and case 210 (also referred to as “outer sleeve”) in which sheath 220 may be retained.
  • Both the inner and outer sleeves may be somewhat flexible, but the two sleeves should act in concert as a channel that both guides the movement of sheath 220 and prevents sheath 220 from rubbing against the enclosed ID card or chip (e.g., card 105 ).
  • inner ( 224 ) and outer sleeves ( 210 ) may be provided with anchor points 226 (see FIG. 4 ) at which the inner ( 224 ) and outer ( 210 ) sleeves are joined through sheath 220 , near or at the bottom of sheath 220 so that effectiveness of sheath 220 for electronic readability protection is not compromised (e.g., bottom of sheath 220 is closed sufficiently to provide Faraday cage shielding as described above).
  • a sufficiently tensile and plastic metal may be selected for the sheath 220 so that the edges of the top opening of sheath 220 will close or “snap” together when sheath 220 is moved (e.g., releasing button 222 ) to the protected or default position, but will separate to allow a card edge (and the top of inner sleeve 224 ) to pass through when sheath 220 is moved to the unprotected or exposed position (e.g., depressing button 222 ).
  • the outside top edges of the inner plastic sleeve 224 may beveled (see FIG.
  • the inner sleeve beveling 227 guides the top edges of sheath 220 away from each other as the sheath 220 slides down the inner sleeve 224 .
  • the inner sides of the outer sleeve may be angled (or beveled) such that outer sleeve beveling 229 drives the top edges of sheath 220 toward each other when the as the sheath 220 slides up the inner sleeve 224 , for example, as spring pressure elongates sheath 220 back to the default position upon release of button 222 .
  • sheath 220 may be variously described as collapsible-extendable (e.g., for a spring-loaded “scissor gate”-style lattice); compressible-expandable (e.g., for a springy or elastic material such as a mesh); or telescoping (e.g., for segments that can nest inside each other).
  • collapsible-extendable e.g., for a spring-loaded “scissor gate”-style lattice
  • compressible-expandable e.g., for a springy or elastic material such as a mesh
  • telescoping e.g., for segments that can nest inside each other.
  • the totality of the sheath 220 may elongate and contract axially (e.g., in the direction of axis 213 ) by any of (or any combination of) the following means, for example: hinged connections inserted in a lattice to create a conventional “scissor gate” lattice; exploiting the plastic or elastic properties of certain metals (such as “shape memory” and conventional alloys) which will temporarily deform and then spring back to their original shape; or allowing segments of the sheath's sides to telescope within each other or along a track or groove.
  • hinged connections inserted in a lattice to create a conventional “scissor gate” lattice exploiting the plastic or elastic properties of certain metals (such as “shape memory” and conventional alloys) which will temporarily deform and then spring back to their original shape; or allowing segments of the sheath's sides to telescope within each other or along a track or groove.
  • a wire mesh may be made of steel, copper, or a similarly pliable metal which also is electrically conductive so as to provide shielding form electromagnetic radiation.
  • the material may be forged, welded, or soldered such that the intersections are permanently joined together and much of the movement may be effected mainly via compression of the metal.
  • the intersecting strands of the mesh material may be riveted together to form a scissor-like joint on which the intersecting strands may pivot, allowing for use of a thicker or less pliable metal.
  • the rivets may be of a sufficiently conductive material so as to not break the continuity of the grid's conductivity.
  • FIG. 5 illustrates a method 500 of providing security for an electronically readable card in accordance with an embodiment.
  • an authentication device 105 such as a credit card, ID badge, passport, or similar item—for which electronic read protection is desired may be inserted into the protective device 200 , for example, by inserting authentication device 105 (e.g., an RFID chip embedded card) through opening 212 in case 210 into inner sleeve 224 after sheath 220 has been moved to the second, unprotected, or exposed position (for example, by depressing and holding down button 222 ) shown in FIG. 2 .
  • authentication device 105 e.g., an RFID chip embedded card
  • a user or wearer of protective device 200 may depress a compression switch (e.g., button 222 ) to draw the sheath 220 down and away from the top slit (e.g., opening 212 ) of the protective device's inner sleeve 224 , as seen in FIG. 2 .
  • a compression switch e.g., button 222
  • the user may insert his or her authentication device 105 , e.g., RFID badge, or similar card, into the inner sleeve 224 such that it is entirely covered by the outer plastic cover (e.g., case 210 ) as seen in FIG. 2 .
  • protective device 200 may be closed so that the sheath 220 encloses or surrounds the card or authentication device 105 , (so as to effectively form a Faraday cage around the card 105 ) protecting the card 105 from being electronically read while allowing the device to remain visible enough that visual information on the card 105 can still be discerned or visually read.
  • a user or wearer of protective device 200 may release pressure on a compression switch (e.g., button 222 ) to allow the sheath 220 to expand and rise to cover the length of the card 105 , at its first or default position, as seen in FIG. 3 .
  • An opening in the top of the sheath 220 may be closed sufficiently—using bevel features or tensile properties of the material of sheath 220 described above, for example—that electronic read protection for card 105 remains effective at the first or default position of sheath 220 .
  • the protective device 200 may be switched to the unprotected or exposed (second) position (shown in FIG. 2 ) for presentation to an electronic reading device 104 (e.g., a card reader) and electronic reading of the card or authentication device by the electronic reading device 104 .
  • an electronic reading device 104 e.g., a card reader
  • a compression switch e.g., button 222
  • the user may depress a compression switch (e.g., button 222 ) for as long as needed for using the card 105 (e.g., long enough to briefly hold the card near a card reader)—which in turn may expose an RFID chip or NFC circuit embedded in card 105 to electromagnetic fields for the duration that the user keeps button 222 depressed (as would be seen in FIG. 2 if the card were already inserted into protective device 200 ).
  • protective device 200 may be switched back to protected or default position, either by simply releasing the switch (e.g., button 222 ) or by switching button 222 back (in an embodiment for which the switch has a catch at both first and second positions of sheath 220 ), for resuming electronic read protection of the card or authentication device.
  • switch e.g., button 222
  • switching button 222 back in an embodiment for which the switch has a catch at both first and second positions of sheath 220 , for resuming electronic read protection of the card or authentication device.
  • the user may release pressure on the switch (e.g., button 222 ) returning the sheath-sleeve system (referring to sheath 220 and inner sleeve 224 ) to an electronically non-readable state (while card 105 may still be visually readable) and shield the card from electromagnetic fields, as seen in FIG. 3 .
  • the switch e.g., button 222
  • spring pressure e.g., elasticity of sheath 220 itself or a separate return spring
  • the metal lattice e.g., sheath 220
  • the system e.g., protective device 200
  • the chip of card 105 effectively cannot be scanned or shorted using conventional technology.
  • embodiments of the invention may comprise a personal computing device, such as a personal computer, laptop, PDA, cellular phone or other personal computing or communication devices.
  • the payment provider system may comprise a network computing device, such as a server or a plurality of servers, computers, or processors, combined to define a computer system or network to provide the payment services provided by a payment provider system.
  • FIG. 1 illustrates an exemplary embodiment of a network-based system 100 for implementing one or more processes described herein.
  • network-based system 100 may comprise or implement a plurality of servers or software components, or both, that operate to perform various methodologies in accordance with the described embodiments.
  • Exemplary servers may include, for example, stand-alone and enterprise-class servers operating a server operating system (OS) such as a MICROSOFT® OS, a UNIX® OS, a LINUX® OS, or other suitable server-based OS.
  • OS server operating system
  • FIG. 1 may be deployed in other ways and that the operations performed or the services provided by such servers may be combined or separated for a given implementation and may be performed by a greater number or fewer number of servers.
  • One or more servers may be operated or maintained by the same or different entities.
  • a computer system may include a bus or other communication mechanism for communicating information, which interconnects subsystems and components, such as a processing component (e.g., processor, micro-controller, digital signal processor (DSP), etc.), a system memory component (e.g., RAM), a static storage component (e.g., ROM), a disk drive component (e.g., magnetic or optical), a network interface component (e.g., modem or Ethernet card), a display component (e.g., CRT or LCD), an input component (e.g., keyboard or keypad), and/or cursor control component (e.g., mouse or trackball).
  • a disk drive component may comprise a database having one or more disk drive components.
  • the computer system may perform specific operations by processor and executing one or more sequences of one or more instructions contained in a system memory component. Such instructions may be read into the system memory component from another computer readable medium, such as static storage component or disk drive component. In other embodiments, hard-wired circuitry may be used in place of or in combination with software instructions to implement the invention.
  • Non-volatile media includes optical or magnetic disks, such as disk drive component
  • volatile media includes dynamic memory, such as system memory component
  • transmission media includes coaxial cables, copper wire, and fiber optics, including wires that comprise bus.
  • transmission media may take the form of acoustic or light waves, such as those generated during radio wave and infrared data communications.
  • Computer readable and executable media include, for example, floppy disk, flexible disk, hard disk, magnetic tape, any other magnetic medium, CD-ROM, any other optical medium, punch cards, paper tape, any other physical medium with patterns of holes, RAM, ROM, E2PROM, FLASH-EPROM, any other memory chip or cartridge, carrier wave, or any other medium from which a computer is adapted to read.
  • execution of instruction sequences for practicing the invention may be performed by a computer system.
  • a plurality of computer systems coupled by a communication link e.g., LAN, WLAN, PSTN, or various other wired or wireless networks
  • a communication link e.g., LAN, WLAN, PSTN, or various other wired or wireless networks
  • Modules described herein can be embodied in one or more computer readable media or be in communication with one or more processors to execute or process the steps described herein.
  • a computer system may transmit and receive messages, data, information and instructions, including one or more programs (i.e., application code) through a communication link and a communication interface.
  • Received program code may be executed by a processor as received and/or stored in a disk drive component or some other non-volatile storage component for execution.
  • various embodiments provided by the present disclosure may be implemented using hardware, software, or combinations of hardware and software.
  • the various hardware components and/or software components set forth herein may be combined into composite components comprising software, hardware, and/or both without departing from the spirit of the present disclosure.
  • the various hardware components and/or software components set forth herein may be separated into sub-components comprising software, hardware, or both without departing from the scope of the present disclosure.
  • software components may be implemented as hardware components and vice-versa—for example, a virtual Secure Element (vSE) implementation or a logical hardware implementation.
  • vSE virtual Secure Element
  • Software in accordance with the present disclosure, such as program code and/or data, may be stored on one or more computer readable and executable mediums. It is also contemplated that software identified herein may be implemented using one or more general purpose or specific purpose computers and/or computer systems, networked and/or otherwise. Where applicable, the ordering of various steps described herein may be changed, combined into composite steps, and/or separated into sub-steps to provide features described herein.

Abstract

Systems and methods for providing security for authentication devices—such as electronically readable cards or ID badges with embedded RFID chips or NFC capability—may include an envelope or pocket-like case for carrying an electronically readable card, having an electrically conductive, non-opaque sleeve that can be moved to cover or expose the electronically readable card and that prevents information on the the card from being electronically read when covered yet still allows the card to be seen when covered. In one or more embodiments, the sleeve may be a wire mesh that is flexible enough to be compressed to expose the card yet stiff (or rigid) enough to be extended to cover the card and that is transparent enough to allow reading visual information on the surface of the card when covering the card. Protection can be switched off by a mechanical switch that leaves the protection normally on.

Description

    CROSS REFERENCE TO RELATED APPLICATIONS
  • This application is a continuation of U.S. patent application Ser. No. 13/689,432, filed Nov. 29, 2012, which is also hereby incorporated by reference in its entirety.
  • BACKGROUND
  • 1. Technical Field
  • Embodiments of the present invention generally relate to security for radio frequency identification (RFID) and, more particularly, to protecting cards having embedded RFID radio frequency for which the protection can be conveniently deactivated yet allows the card to remain visible even while protected.
  • 2. Related Art
  • Radio frequency identification (RFID) chips, which can be remotely activated to wirelessly transmit information from the chip, are widely used in many types of authentication devices, including, for example, credit cards, passports, and identity badges, in which a tiny RFID chip may be embedded. Information contained in an RFID chip is, however, often insecure for a number of reasons. For example, the information may not be encrypted due to encryption being expensive for manufacturers; attackers may be able to remotely identify, read, and copy the information stored on an RFID chip using an RFID skimmer that electronically reads and copies the information; and the equipment necessary to skim an RFID authentication device may be obtainable at relatively low cost.
  • Currently, owners of RFID badges, RFID-embedded credit cards such as payWave™ or PayPass™ credit cards, and other authentication devices using RFID or near field communication (NFC), for example, may sometimes use pouch-like enclosures impregnated with metals to guard against surreptitious duplication or sabotage of their credentials. Such enclosures may take the form of homemade wallets consisting of tinfoil and duct tape, for example, or more sturdy products made with nylon and steel. While these enclosures can be quite effective, they are often cumbersome and require the user to fully remove and then replace the credential device. This type of protection is also unsuitable for credentials—such as identification badges—that must be worn and displayed visibly even when not being used for electronic authentication.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • FIG. 1 is a system block diagram illustrating a system in accordance with one or more embodiments of the present invention.
  • FIG. 2 is a perspective view illustrating an apparatus in accordance with an embodiment.
  • FIG. 3 is a perspective view illustrating an apparatus in accordance with an embodiment.
  • FIG. 4 is a cross sectional view, taken along line A-A of FIG. 3, illustrating an apparatus in accordance with an embodiment.
  • FIG. 5 is a flow chart illustrating a method of providing security for an electronically readable card in accordance with an embodiment.
  • Embodiments of the present disclosure and their advantages are best understood by referring to the detailed description that follows. It should be appreciated that like reference numerals are used to identify like elements illustrated in one or more of the figures, in which the showings therein are for purposes of illustrating the embodiments and not for purposes of limiting them.
  • DETAILED DESCRIPTION
  • Broadly speaking, methods and systems are provided in one or more embodiments for providing security for cards and authentication devices having embedded radio frequency identification (RFID) in which the authentication device (e.g., a credit card or identification (ID) badge) is protected from being read electronically while still being visible (e.g., visually readable, such as a photo ID badge) and the protection can be conveniently deactivated by a user, allowing the authentication device or card to be read electronically.
  • Items with embedded radio frequency identification (RFID) or near-field communication (NFC) chips often lack a means to easily disable transceiver components when they are not needed or during times when their operation would constitute a security risk. For example, RFID-enabled bank credit cards have been the object of some concern because of the readiness with which criminals can “clone” or “skim” them using modified readers similar to those of legitimate merchants and getting near enough to a credit card to coax its response signals. In addition, the vulnerability of RFID circuits to directed electromagnetic radiation could, for example, enable a skilled social engineer to permanently deactivate an unsuspecting employee's ID badge from a distance and then exploit a power relationship (e.g., posing as a security guard or “helpful” information technology (IT) specialist) to con the employee into revealing other identity information.
  • Embodiments may address such scenarios, improving ID badge security by guarding against surreptitious duplication and chip destruction while at the same time preserving other functionality of the card or badge such as visibility of a photo identification affixed to an ID badge. The selective RFID deactivation system that allows the read-protection to be deactivated upon a user's selection of a switch position may allow users to travel freely and securely in the knowledge that, until the user pushes down the deactivation switch, the user's badge is non-readable electronically (while remaining visually readable). As a consequence, an ID badge protected by one embodiment can compensate for unforeseen circumstances, for example, a lack of cautiousness on the part of a user—protecting the user in situations where the user might otherwise inadvertently or guilelessly expose the ID badge to unauthorized electronic reading outside of a secure work environment.
  • In one embodiment, for example, a carrying case-like apparatus may allow a user to place an RFID-embedded badge, credit card, or other chip-embedded item (generally referred to as electronically readable authentication device or card) inside the case and selectively enable or disable reading of the card by simply pressing down on a switch (e.g., button, lever, or slider). Activation and deactivation of electronic read-protection for the item may be achieved, in one or more embodiments, by way of a flexible, electrically conductive mesh or sheath that runs along a channel between layers of protective plastic in the case. The mesh may be compressed (moving the mesh to electronically expose the item, allowing the item to be electronically read) whenever the user presses the switch. The mesh or sheath, when uncompressed, may act according to the physical principles of a Faraday cage, preventing the electronically readable card from being accessed or read electronically, by surrounding or enclosing the item and obscuring the item from electric fields and electromagnetic radiation. The mesh or sheath, however, may be virtually transparent or at least semi-transparent so that the item remains visible and information on the item—such as an ID photo and text information—can still be seen or read optically. Embodiments may differ from other products for protecting electronically readable cards that are more similar to a conventional wallet and completely cover the chip-embedded card so that it is not visible. Faraday cages are typically rigid rather than flexible, requiring a door-like opening, or flap, to be opened to move objects into and out of the cage.
  • In one or more embodiments, systems and methods provide an envelope or pocket-like case for carrying an electronically readable card, having an electrically conductive, non-opaque sheath that can be moved to cover or expose the electronically readable card and that prevents information on the the card from being electronically read when covered yet still allows the card to be seen, e.g., preserving visual functionality, when covered. In one or more embodiments, the sheath may be a wire mesh that is flexible enough to be compressed to expose the card yet stiff (or rigid) enough to be extended to cover the card and that is transparent enough to allow reading visual information on the surface of the card when covering the card.
  • For example, according to one embodiment, a system may include: a case having an opening for inserting an authentication device and an inside shaped to accept the authentication device, in which the case allows the authentication device to remain visible when the authentication device is inside the case; and a flexible, electrically conductive sheath inside the case, the sheath having a first position and a second position, and readily moveable between the two positions, such that: in the first position, when the authentication device is inside the case, the electrically conductive sheath encloses the authentication device and the authentication device remains visible through the sheath; and in the second position, the sheath does not enclose the authentication device.
  • Also, according to one embodiment, a method may include: protecting an electronically readable card from being electronically read while maintaining visual readability of the electronically readable card; mechanically switching off a protection of the electronically readable card for presentation to an electronic card reader; and mechanically switching the protection back on so that the electronically readable card is protected from being electronically read yet is still visually readable.
  • FIG. 1 illustrates a system 100 that may employ methods and devices for improving security of an authentication device 105, in accordance with one or more embodiments. A user 102 (e.g., a consumer using an electronically readable credit card or employee carrying or wearing an ID badge) may present an authentication device 105 (e.g., an RFID-embedded badge, credit card, or other chip-embedded or NFC enabled item) to a reader device 104. Reader device 104 may electronically read information from authentication device 105 according to the technology involved, e.g., RFID or NFC. Reader device 104 may include a computing device (e.g., a computer, cell phone, POS terminal, or other electronic device) configured to communicate over a communication network 106, which may be implemented as a single network or a combination of multiple networks. For example, network 106 may include the Internet as well as phone networks such as Public Switched Telephone Network (PSTN) or one or more intranets, landline networks, wireless networks, or other appropriate types of networks.
  • Reader device 104 may communicate via network 106 with a website 108 that may be operated by a commercial entity, such as a security service or a merchant website that is a seller of retail goods, for example For example, website 108 may be a merchant website, may sell goods online, and may communicate with reader device 104 (e.g., a POS terminal) by operating a server 110 (e.g., a computer processor) that presents a website for selling goods. The server 110 may respond to client devices (e.g., client 111 running on reader device 104) by communicating over network 106. Website 108 may also maintain a database 114 and provide user accounts for its customers. Database 114 may provide convenience for customers of the merchant (e.g., merchant website 108) by allowing, for example, users to keep their shipping information on file with the merchant so as not to have to re-enter information with every order, or, for example, the merchant may like to offer promotions for users with an account on merchant website 108. Merchant website 108 may operate a backend server 116 that is limited in its communications over network 106 and may communicate with server 110 and database 114 through a firewall for providing more secure operations than would be possible with server 110. In another example, website 108 may provide a security service that, for example, tracks authentication devices 105 (e.g., authentication device 105 may be an employee ID badge).
  • Website 108 may also communicate (for example, using server 110) with a financial service provider (FSP) 120 through FSP server 122 over network 106. For example, website 108 may communicate with FSP 120 in the course of various services offered by FSP 120 to website 108, such as payment intermediary between customers (e.g., consumer user 102 of merchant website 108) and merchant website 108 itself. For example, merchant website 108 may use an application programming interface (API) 112 that allows it to run apps and offer sale of goods in which customers are allowed to make payment through FSP 120, while consumer user 102 may have an account with FSP 120 that allows consumer user 102 to use the FSP 120 for making payments to sellers that allow use of authentication, authorization, and payment services 124 of FSP 120 as a payment intermediary. Financial service provider services may also include, for example, an online payment service operating between consumers and merchants and may also be a service provided by a financial service provider (FSP)—such as PayPal, Inc. of San Jose, Calif.—in which a user of the service may have an account with the FSP (referred to as an “FSP account”). Also as shown in FIG. 1, FSP 120 may provide electronic data storage in the form of database 126. Database 126 may be used to keep track of user's accounts 128 with FSP 120, merchant's accounts with FSP 120, and transactions between customers, merchants, and stores including payments between the various entities, for example. FSP server 122 may execute various application programming interfaces (APIs) that may enable various different types of relationships between FSP 120 and the different parties shown in FIG. 1. In addition, FSP may provide various APIs 125 to its customers such as website 108 (e.g., API 112) that enable those websites to implement embodiments of authentication, authorization, and password reset services.
  • FIGS. 2, 3, and 4 illustrate a protective device 200, in accordance with an embodiment, that may used for guarding electronic readability of authentication device 105 shown in FIG. 1. Authentication device 105 may be a card with an embedded chip, such as an RFID chip or NFC enabled chip or circuit, for example, referred to as a chip-embedded card. For brevity, authentication device 105 may be referred to as “card 105”.
  • FIG. 2 shows a relatively small (e.g., sized to hold a typical credit card, ID badge, or passport) protective device 200 that may include a case 210 or outer shell that encloses a sheath 220 that is moveable to enclose the card 105, as shown in FIG. 3, when the card 105 is inside the case 210. When in the configuration shown in FIG. 3, sheath 220 may completely enclose card 105 or may enclose card 105 sufficiently to act as a Faraday cage that may protect card 105 from being electronically read by a card reader, such as card reader 104 or some other, possibly surreptitiously placed or used, card reading device.
  • For example, the size of holes or openings (e.g., any part of the cage's uninterrupted open areas—measured in any dimension or direction) in a Faraday cage may be related to the wavelength of electromagnetic radiation that it is intended for the Faraday cage to block according to a general empirical rule that the size of any opening should be no larger than about 1/10 to 1/20 of the smallest wavelength intended to be blocked. So for example, for the 900 mega-Hertz (MHz) frequency band commonly employed in RFID schemes the wavelength is approximately 33 centimeters (cm), so that a Faraday cage with openings for which the maximum dimension of any opening is no greater than about 1.65 cm (based on 1/20 of a wavelength) should be more than sufficient to provide protection from being electronically read at 900 MHz or less for a card enclosed within the Faraday cage (e.g., a card 105 enclosed within a sheath 220).
  • As shown in FIG. 2, case 210 may have an opening 212 for inserting card 105 and the opening 212 may determine—by being more or less perpendicular to the opening 212—an axis 213 of case 210, along which card 105 may be inserted into case 210, as indicated by the arrow in FIG. 2. Sheath 220 may be collapsible and expandable axially with reference to axis 213 as can be seen by comparison between FIG. 2 and FIG. 3 of the positions of sheath 220. In a protected, or default, first position, shown in FIG. 3, sheath 220 may enclose and protect card 105 from being electronically read (but still allow information on card 105 to remain visible or capable of being visually read). In an unprotected, or exposed, second position, shown in FIG. 2, sheath 220 may leave enough of card 105 electronically exposed to be electronically readable by a card reading device, such as card reader 104 (as well as still being visible). A button 222—such as a slider, lever, catch, or other mechanism—may be provided for convenient finger operation in moving sheath 220 between its first and second positions.
  • For example, a mechanism may be so arranged (e.g., using spring tension or elasticity of the sheath 220 material itself) that button 222 needs to be held to maintain sheath 220 in the exposed position shown in FIG. 2 so that sheath 220 automatically returns to the default, protected position shown in FIG. 3 when button 222 is released. In another example, a mechanism may be so arranged that button 222 catches and remains in the last position selected by a user. For added convenience and accessibility, case 210 may further include a hole 214 or other suitable attachment point (e.g., for a clip attachment) for attaching the case 210, for example, to clothing, a lanyard, or a key-ring.
  • In another example, instead of having a button 222 on the side of the case 210, the entire sheath 220 assembly (including spring tension or compression) may be inverted so that the sheath 220 is compressed only when a lanyard or similar attachment device is pulled. In this example, sheath 220 may be attached to a sliding component of the case 210, so that sheath 220 compresses in an upward direction (with respect to the orientation of the security badge and the wearer) instead of downward (as seen in FIG. 2).
  • In general, sheath 220 may be regarded as a cylinder with cylindrical axis 213, surrounding card 105. Sheath 220 may also surround an inner sleeve 224 also regarded as generalized cylinder having cylindrical axis 213, as shown in cross section in FIG. 4. Both case 210 and inner sleeve 224 may be made of transparent plastic; case 210 may be made of a harder plastic and inner sleeve 224 may be more flexible. Inner sleeve 224 may be configured so that card 105 may slide into inner sleeve 224 and inner sleeve 224 is surrounded by sheath 220, which is surrounded by case 210, so that a space or channel is formed between inner sleeve 224 and case 210 (also referred to as “outer sleeve”) in which sheath 220 may be retained. Both the inner and outer sleeves may be somewhat flexible, but the two sleeves should act in concert as a channel that both guides the movement of sheath 220 and prevents sheath 220 from rubbing against the enclosed ID card or chip (e.g., card 105). To ensure relative stability of the disposition of inner sleeve 224 with respect to outer sleeve (case) 210, inner (224) and outer sleeves (210) may be provided with anchor points 226 (see FIG. 4) at which the inner (224) and outer (210) sleeves are joined through sheath 220, near or at the bottom of sheath 220 so that effectiveness of sheath 220 for electronic readability protection is not compromised (e.g., bottom of sheath 220 is closed sufficiently to provide Faraday cage shielding as described above).
  • A sufficiently tensile and plastic metal (or other electrically conductive material) may be selected for the sheath 220 so that the edges of the top opening of sheath 220 will close or “snap” together when sheath 220 is moved (e.g., releasing button 222) to the protected or default position, but will separate to allow a card edge (and the top of inner sleeve 224) to pass through when sheath 220 is moved to the unprotected or exposed position (e.g., depressing button 222). To achieve this type of closure for the top of sheath 220, the outside top edges of the inner plastic sleeve 224 may be beveled (see FIG. 4) so that the inner sleeve beveling 227 guides the top edges of sheath 220 away from each other as the sheath 220 slides down the inner sleeve 224. Alternately, or in addition to inner sleeve beveling 227, the inner sides of the outer sleeve may be angled (or beveled) such that outer sleeve beveling 229 drives the top edges of sheath 220 toward each other when the as the sheath 220 slides up the inner sleeve 224, for example, as spring pressure elongates sheath 220 back to the default position upon release of button 222.
  • Depending on the material and construction of sheath 220, the movability of sheath 220 may be variously described as collapsible-extendable (e.g., for a spring-loaded “scissor gate”-style lattice); compressible-expandable (e.g., for a springy or elastic material such as a mesh); or telescoping (e.g., for segments that can nest inside each other).
  • The totality of the sheath 220 may elongate and contract axially (e.g., in the direction of axis 213) by any of (or any combination of) the following means, for example: hinged connections inserted in a lattice to create a conventional “scissor gate” lattice; exploiting the plastic or elastic properties of certain metals (such as “shape memory” and conventional alloys) which will temporarily deform and then spring back to their original shape; or allowing segments of the sheath's sides to telescope within each other or along a track or groove. For a mesh sheath 220, a wire mesh may be made of steel, copper, or a similarly pliable metal which also is electrically conductive so as to provide shielding form electromagnetic radiation. The material may be forged, welded, or soldered such that the intersections are permanently joined together and much of the movement may be effected mainly via compression of the metal. Alternatively, the intersecting strands of the mesh material may be riveted together to form a scissor-like joint on which the intersecting strands may pivot, allowing for use of a thicker or less pliable metal. In this latter configuration, the rivets may be of a sufficiently conductive material so as to not break the continuity of the grid's conductivity.
  • FIG. 5 illustrates a method 500 of providing security for an electronically readable card in accordance with an embodiment. At step 501, an authentication device 105—such as a credit card, ID badge, passport, or similar item—for which electronic read protection is desired may be inserted into the protective device 200, for example, by inserting authentication device 105 (e.g., an RFID chip embedded card) through opening 212 in case 210 into inner sleeve 224 after sheath 220 has been moved to the second, unprotected, or exposed position (for example, by depressing and holding down button 222) shown in FIG. 2. For example, a user or wearer of protective device 200 may depress a compression switch (e.g., button 222) to draw the sheath 220 down and away from the top slit (e.g., opening 212) of the protective device's inner sleeve 224, as seen in FIG. 2. After opening the protective device 200, the user may insert his or her authentication device 105, e.g., RFID badge, or similar card, into the inner sleeve 224 such that it is entirely covered by the outer plastic cover (e.g., case 210) as seen in FIG. 2.
  • At step 502, protective device 200 may be closed so that the sheath 220 encloses or surrounds the card or authentication device 105, (so as to effectively form a Faraday cage around the card 105) protecting the card 105 from being electronically read while allowing the device to remain visible enough that visual information on the card 105 can still be discerned or visually read. For example, a user or wearer of protective device 200 may release pressure on a compression switch (e.g., button 222) to allow the sheath 220 to expand and rise to cover the length of the card 105, at its first or default position, as seen in FIG. 3.
  • An opening in the top of the sheath 220 may be closed sufficiently—using bevel features or tensile properties of the material of sheath 220 described above, for example—that electronic read protection for card 105 remains effective at the first or default position of sheath 220.
  • At step 503, the protective device 200 may be switched to the unprotected or exposed (second) position (shown in FIG. 2) for presentation to an electronic reading device 104 (e.g., a card reader) and electronic reading of the card or authentication device by the electronic reading device 104. For example, when a user or wearer of protective device 200 is presented with a situation in which the card 105 may be used (e.g., for making a credit card payment or passing an ID checkpoint) the user may depress a compression switch (e.g., button 222) for as long as needed for using the card 105 (e.g., long enough to briefly hold the card near a card reader)—which in turn may expose an RFID chip or NFC circuit embedded in card 105 to electromagnetic fields for the duration that the user keeps button 222 depressed (as would be seen in FIG. 2 if the card were already inserted into protective device 200).
  • At step 504, protective device 200 may be switched back to protected or default position, either by simply releasing the switch (e.g., button 222) or by switching button 222 back (in an embodiment for which the switch has a catch at both first and second positions of sheath 220), for resuming electronic read protection of the card or authentication device.
  • For example, once a user or wearer of protective device 200 no longer needs to use authentication device 105 for being electronically read, the user may release pressure on the switch (e.g., button 222) returning the sheath-sleeve system (referring to sheath 220 and inner sleeve 224) to an electronically non-readable state (while card 105 may still be visually readable) and shield the card from electromagnetic fields, as seen in FIG. 3.
  • In an example according to one embodiment, when the user lets go of the compression switch (e.g., button 222), spring pressure (e.g., elasticity of sheath 220 itself or a separate return spring) may cause the metal lattice (e.g., sheath 220) to expand and enclose the card 105, to act as a protective Faraday cage. While the system (e.g., protective device 200) is in this “default” position, the chip of card 105 effectively cannot be scanned or shorted using conventional technology.
  • In implementation of the various embodiments, embodiments of the invention may comprise a personal computing device, such as a personal computer, laptop, PDA, cellular phone or other personal computing or communication devices. The payment provider system may comprise a network computing device, such as a server or a plurality of servers, computers, or processors, combined to define a computer system or network to provide the payment services provided by a payment provider system.
  • FIG. 1 illustrates an exemplary embodiment of a network-based system 100 for implementing one or more processes described herein. As shown, network-based system 100 may comprise or implement a plurality of servers or software components, or both, that operate to perform various methodologies in accordance with the described embodiments. Exemplary servers may include, for example, stand-alone and enterprise-class servers operating a server operating system (OS) such as a MICROSOFT® OS, a UNIX® OS, a LINUX® OS, or other suitable server-based OS. It can be appreciated that the servers illustrated in FIG. 1 may be deployed in other ways and that the operations performed or the services provided by such servers may be combined or separated for a given implementation and may be performed by a greater number or fewer number of servers. One or more servers may be operated or maintained by the same or different entities.
  • In this regard, a computer system may include a bus or other communication mechanism for communicating information, which interconnects subsystems and components, such as a processing component (e.g., processor, micro-controller, digital signal processor (DSP), etc.), a system memory component (e.g., RAM), a static storage component (e.g., ROM), a disk drive component (e.g., magnetic or optical), a network interface component (e.g., modem or Ethernet card), a display component (e.g., CRT or LCD), an input component (e.g., keyboard or keypad), and/or cursor control component (e.g., mouse or trackball). In one embodiment, a disk drive component may comprise a database having one or more disk drive components.
  • The computer system may perform specific operations by processor and executing one or more sequences of one or more instructions contained in a system memory component. Such instructions may be read into the system memory component from another computer readable medium, such as static storage component or disk drive component. In other embodiments, hard-wired circuitry may be used in place of or in combination with software instructions to implement the invention.
  • Logic may be encoded in a computer readable and executable medium, which may refer to any medium that participates in providing instructions to the processor for execution. Such a medium may take many forms, including but not limited to, non-volatile media, volatile media, and transmission media. In one embodiment, the computer readable medium is non-transitory. In various implementations, non-volatile media includes optical or magnetic disks, such as disk drive component, volatile media includes dynamic memory, such as system memory component, and transmission media includes coaxial cables, copper wire, and fiber optics, including wires that comprise bus. In one example, transmission media may take the form of acoustic or light waves, such as those generated during radio wave and infrared data communications.
  • Some common forms of computer readable and executable media include, for example, floppy disk, flexible disk, hard disk, magnetic tape, any other magnetic medium, CD-ROM, any other optical medium, punch cards, paper tape, any other physical medium with patterns of holes, RAM, ROM, E2PROM, FLASH-EPROM, any other memory chip or cartridge, carrier wave, or any other medium from which a computer is adapted to read.
  • In various embodiments, execution of instruction sequences for practicing the invention may be performed by a computer system. In various other embodiments, a plurality of computer systems coupled by a communication link (e.g., LAN, WLAN, PSTN, or various other wired or wireless networks) may perform instruction sequences to practice the invention in coordination with one another.
  • Modules described herein can be embodied in one or more computer readable media or be in communication with one or more processors to execute or process the steps described herein.
  • A computer system may transmit and receive messages, data, information and instructions, including one or more programs (i.e., application code) through a communication link and a communication interface. Received program code may be executed by a processor as received and/or stored in a disk drive component or some other non-volatile storage component for execution.
  • Where applicable, various embodiments provided by the present disclosure may be implemented using hardware, software, or combinations of hardware and software. Also, where applicable, the various hardware components and/or software components set forth herein may be combined into composite components comprising software, hardware, and/or both without departing from the spirit of the present disclosure. Where applicable, the various hardware components and/or software components set forth herein may be separated into sub-components comprising software, hardware, or both without departing from the scope of the present disclosure. In addition, where applicable, it is contemplated that software components may be implemented as hardware components and vice-versa—for example, a virtual Secure Element (vSE) implementation or a logical hardware implementation.
  • Software, in accordance with the present disclosure, such as program code and/or data, may be stored on one or more computer readable and executable mediums. It is also contemplated that software identified herein may be implemented using one or more general purpose or specific purpose computers and/or computer systems, networked and/or otherwise. Where applicable, the ordering of various steps described herein may be changed, combined into composite steps, and/or separated into sub-steps to provide features described herein.
  • The foregoing disclosure is not intended to limit the present invention to the precise forms or particular fields of use disclosed. It is contemplated that various alternate embodiments and/or modifications to the present invention, whether explicitly described or implied herein, are possible in light of the disclosure. Having thus described various example embodiments of the disclosure, persons of ordinary skill in the art will recognize that changes may be made in form and detail without departing from the scope of the invention. Thus, the invention is limited only by the claims.

Claims (20)

What is claimed is:
1. An apparatus for protecting an electronic device comprising:
a case having a cavity; and
a flexible, electrically conductive sheath inside the case and compressible between a first position and a second position, wherein the electrically conductive sheath surrounds the electronic device in the first position and the electrically conductive sheath surrounds only a portion of the electronic device in the second position.
2. The apparatus of claim 1, wherein the flexible, electrically conductive sheath comprises a sleeve inside the flexible, electrically conductive sheath, wherein the sleeve is configured to hold the electronic device inside the flexible, electrically conductive sheath, and wherein the flexible, electrically conductive sheath surrounds the sleeve so that the sheath remains between the case and sleeve when moving between the first position and the second position.
3. The apparatus of claim 1, wherein the flexible, electrically conductive sheath comprises a mesh of electrically conductive material that compresses and expands in an axial direction, and wherein the flexible, electrically conductive sheath moves axially to move to the first position and compressing axially to move to the second position.
4. The apparatus of claim 3, further comprising:
a lock configured to hold the flexible, electrically conductive sheath in the second position.
5. The apparatus of claim 3, wherein the flexible, electrically conductive sheath compresses and expands by one of a scissoring action of elements of the mesh, plastic deformation and recovery inherent in a shape memory of the electrically conductive material of the flexible, electrically conductive sheath, and telescoping of segments of the flexible, electrically conductive sheath.
6. The apparatus of claim 1, wherein the electronic device comprises one of a card with an RFID tag, a mobile phone, a computing device, a credit card, and a device with a readable chip embedded in the device.
7. The apparatus of claim 1, wherein the first position prevents electrical fields from accessing the electronic device, and wherein the electronic device is substantially visible in the first position.
8. The apparatus of claim 7, wherein the second position allows the electrical fields to access the electronic device, and wherein the electronic device is substantially visible in the second position
9. The apparatus of claim 1, wherein the flexible, electrically conductive sheath comprises a mesh that compresses from the first position to the second position, and wherein the apparatus further comprises:
a mechanical switch to move the mesh from the first position to the second position
10. The apparatus of claim 9, wherein the mesh provides a resistance to the second position, wherein the mechanical switch locks the mesh into the second position, and wherein the resistance moves the mesh from the second position to the first position without the mechanical switch
11. A device comprising:
an electronic device;
a case for the electronic device; and
a flexible, electrically conductive sheath inside the case and surrounding the electronic device, wherein the flexible, electrically conductive sheath is compressible between a first position and a second position, and wherein the electrically conductive sheath surrounds the electronic device in the first position and the electrically conductive sheath surrounds none or a portion of the electronic device in the second position.
12. The device of claim 11, wherein the flexible, electrically conductive sheath comprises a sleeve inside the flexible, electrically conductive sheath, wherein the sleeve is configured to hold the electronic device inside the flexible, electrically conductive sheath, and wherein the flexible, electrically conductive sheath surrounds the sleeve so that the sheath remains between the case and sleeve when moving between the first position and the second position.
13. The device of claim 11, wherein the flexible, electrically conductive sheath comprises a mesh of electrically conductive material that compresses and expands in an axial direction, and wherein the flexible, electrically conductive sheath moves axially to move to the first position and compressing axially to move to the second position.
14. The device of claim 13, wherein the flexible, electrically conductive sheath compresses and expands by one of a scissoring action of elements of the mesh, plastic deformation and recovery inherent in a shape memory of the electrically conductive material of the flexible, electrically conductive sheath, and telescoping of segments of the flexible, electrically conductive sheath.
15. The device of claim 11, wherein the electronic device comprises one of a card with an RFID tag, a mobile phone, a computing device, a credit card, and a device with a readable chip embedded in the device.
16. The device of claim 11, wherein the first position prevents electrical fields from accessing the electronic device, and wherein the electronic device is substantially visible in the first position.
17. The device of claim 16, wherein the second position allows the electrical fields to access the electronic device, and wherein the electronic device is substantially visible in the second position.
18. The device of claim 11, wherein the flexible, electrically conductive sheath comprises a mesh that compresses from the first position to the second position, and wherein the device further comprises:
a mechanical switch to move the mesh from the first position to the second position.
19. The device of claim 18, wherein the mesh provides a resistance to the second position, wherein a mechanical switch locks the mesh into the second position, and wherein the resistance moves the mesh from the second position to the first position without the mechanical switch.
20. A method comprising:
providing a case for an electronic device; and
providing a flexible, electrically conductive sheath inside the case and surrounding the electronic device, wherein the flexible, electrically conductive sheath is compressible between a first position and a second position, and wherein the electrically conductive sheath surrounds the electronic device in the first position and the electrically conductive sheath surrounds none or a portion of the electronic device in the second position.
US14/853,938 2012-11-29 2015-09-14 Portable mechanical switch for selective deactivation of radio frequency identification circuits Active US9572292B2 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US14/853,938 US9572292B2 (en) 2012-11-29 2015-09-14 Portable mechanical switch for selective deactivation of radio frequency identification circuits

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US13/689,432 US9135548B2 (en) 2012-11-29 2012-11-29 Portable mechanical switch for selective deactivation of radio frequency identification circuits
US14/853,938 US9572292B2 (en) 2012-11-29 2015-09-14 Portable mechanical switch for selective deactivation of radio frequency identification circuits

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US13/689,432 Continuation US9135548B2 (en) 2012-11-29 2012-11-29 Portable mechanical switch for selective deactivation of radio frequency identification circuits

Publications (2)

Publication Number Publication Date
US20160007508A1 true US20160007508A1 (en) 2016-01-07
US9572292B2 US9572292B2 (en) 2017-02-14

Family

ID=50773124

Family Applications (2)

Application Number Title Priority Date Filing Date
US13/689,432 Active 2033-11-06 US9135548B2 (en) 2012-11-29 2012-11-29 Portable mechanical switch for selective deactivation of radio frequency identification circuits
US14/853,938 Active US9572292B2 (en) 2012-11-29 2015-09-14 Portable mechanical switch for selective deactivation of radio frequency identification circuits

Family Applications Before (1)

Application Number Title Priority Date Filing Date
US13/689,432 Active 2033-11-06 US9135548B2 (en) 2012-11-29 2012-11-29 Portable mechanical switch for selective deactivation of radio frequency identification circuits

Country Status (1)

Country Link
US (2) US9135548B2 (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106330230A (en) * 2016-11-11 2017-01-11 深圳天珑无线科技有限公司 Card protective circuit, neck, terminal and card protective method
US20180027616A1 (en) * 2016-07-21 2018-01-25 Ut-Battelle, Llc Electromagnetic print nozzle for direct-write additive manufacturing with resistive renditions
US20180340838A1 (en) * 2017-05-23 2018-11-29 Barry Nicholson, JR. Temperature Measuring and Logging Slide

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9135548B2 (en) * 2012-11-29 2015-09-15 Paypal, Inc. Portable mechanical switch for selective deactivation of radio frequency identification circuits
US9160742B1 (en) * 2013-09-27 2015-10-13 Emc Corporation Localized risk analytics for user authentication
CN105516219B (en) * 2014-09-24 2018-12-18 中国电信股份有限公司 Method, system and the card management server of embedded smart card security deactivation
US9633239B2 (en) * 2015-09-24 2017-04-25 Advanced Digital Broadcast S.A. System and method for selective access to RFID functionality
CN105976470B (en) * 2016-05-18 2018-07-06 南京东屋电气有限公司 It is a kind of to carry the intelligent lock and management method for being switched fast management
FR3063164B1 (en) * 2017-02-22 2021-06-04 Mpo Int CONNECTED RECORDING MEDIA DISC
DK3544399T3 (en) 2018-03-20 2022-10-17 Sanko Tekstil Isletmeleri San Ve Tic As SWITCHABLE ELECTROMAGNETIC SHIELDING

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6121544A (en) * 1998-01-15 2000-09-19 Petsinger; Julie Ann Electromagnetic shield to prevent surreptitious access to contactless smartcards
US20030132132A1 (en) * 2002-01-16 2003-07-17 Small George H Retractable identification holder and methods of using same
US20080265039A1 (en) * 2007-04-27 2008-10-30 First Data Corporation Protected Contactless Card
US7604176B2 (en) * 2004-05-20 2009-10-20 American Express Travel Related Services Company, Inc. Radio frequency fobs and methods of using the same
US7911355B2 (en) * 2006-04-04 2011-03-22 Infineon Technologies Ag Apparatus for storing and wirelessly transmitting data
US20120228168A1 (en) * 2011-03-08 2012-09-13 Michael William Kitchen Electromagnetic shielding carrying case for contactless smartcards and personal articles
US9125465B2 (en) * 2012-08-29 2015-09-08 Daniel Vern Beckley Wallet
US9135548B2 (en) * 2012-11-29 2015-09-15 Paypal, Inc. Portable mechanical switch for selective deactivation of radio frequency identification circuits

Family Cites Families (34)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4647714A (en) * 1984-12-28 1987-03-03 Sohwa Laminate Printing Co., Ltd. Composite sheet material for magnetic and electronic shielding and product obtained therefrom
US6155410A (en) * 1999-10-07 2000-12-05 Davis; Mathew Credit card case
AU2002950762A0 (en) * 2002-08-14 2002-09-12 John Philip Griffits Identification and selection of mechanical keys
US7221900B2 (en) * 2002-11-21 2007-05-22 Kimberly-Clark Worldwide, Inc. Jamming device against RFID smart tag systems
US20040148837A1 (en) * 2003-02-05 2004-08-05 Lewis Cameron P. Card holder protective of information bearing surface
US6845863B1 (en) * 2003-04-22 2005-01-25 Herman Riley Card magnetic strip protector sleeve
FR2863748B1 (en) * 2003-12-12 2006-02-24 Thales Sa SECURE DOCUMENT WITH NON-CONTACT CHIP WITH DATA MASKING
US20050183579A1 (en) * 2004-02-24 2005-08-25 Bowers Gary L. Tea bag squeezer
US7669765B2 (en) * 2004-04-23 2010-03-02 Winware, Inc. RFID switching
US7527170B2 (en) * 2004-08-03 2009-05-05 Derek Slocum Weatherproof card holder/dispenser for vehicle exteriors
US20060124747A1 (en) * 2004-12-09 2006-06-15 Rathbun Irwin D Protective envelope for a chip card
AU2005332555B2 (en) * 2005-06-03 2011-05-12 Steven Gary O'shea Carrying devices for RF tokens
US20070289775A1 (en) * 2005-08-16 2007-12-20 Potts Kevin L Rfid shielding devices
US20070157494A1 (en) * 2006-01-06 2007-07-12 Barcikowski John C Retractable badgeholder device
US7635089B2 (en) * 2006-07-03 2009-12-22 Identity Stronghold, Llc Device for shielding reading of a contactless smartcard
JP4466689B2 (en) * 2006-08-31 2010-05-26 株式会社カシオ日立モバイルコミュニケーションズ Antenna and portable electronic device
US7523870B2 (en) * 2006-10-04 2009-04-28 Assa Abloy Ab RFID card retention assembly
CN101231707A (en) * 2007-01-25 2008-07-30 3M创新有限公司 Electromagnetic shielding device
JP5273871B2 (en) * 2007-02-14 2013-08-28 カバ・アクチェンゲゼルシャフト System and portable device for transmission of identification signals
US7851517B2 (en) * 2007-05-08 2010-12-14 Lisa Marie Holmes Antimicrobial credit cards, identification cards, membership cards and identification badges and badge holders
US20090078590A1 (en) * 2008-01-21 2009-03-26 Smith Dennis R Ultrasecure card package
EP2242003B1 (en) * 2008-02-06 2012-04-25 Taiyo, Inc. Non-contact ic card communication controller and non-contact ic card holder
US8004414B2 (en) * 2008-03-14 2011-08-23 International Business Machines Corporation Use of RFIDs to measure flow-rates of materials flowing through piping
GB0805780D0 (en) * 2008-03-31 2008-04-30 Royal Bank Of Scotland Plc The Processor card arrangement
US7830672B1 (en) * 2008-06-27 2010-11-09 Michael William Kitchen Electromagnetic shielding carrying case for contactless smartcards and personal articles
KR101773380B1 (en) * 2009-04-22 2017-08-31 프란웰, 아이엔씨. A wearable rfid system
GB201005743D0 (en) * 2010-04-06 2010-05-19 Orb Information Technology Ltd Document shield with proximity change alert
US8655274B2 (en) * 2010-12-21 2014-02-18 Blackberry Limited Communications device including radio frequency (RF) signal blocking layer for near-field communication (NFC) device and related methods
US20120309307A1 (en) * 2011-06-03 2012-12-06 D Amico Nate Nfc method, arrangement and setup
US8578982B2 (en) * 2011-06-28 2013-11-12 Victor Lee Scanner resistant device for RFID cards
US9256773B2 (en) * 2011-07-27 2016-02-09 Féinics Amatech Teoranta Capacitive coupling of an RFID tag with a touch screen device acting as a reader
US20130037615A1 (en) * 2011-08-10 2013-02-14 Tara Powell Card Cover
US9129200B2 (en) * 2012-10-30 2015-09-08 Raytheon Corporation Protection system for radio frequency communications
US8841987B1 (en) * 2013-11-22 2014-09-23 Local Motion, Inc. Upgrade kit for an ignition key and methods

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6121544A (en) * 1998-01-15 2000-09-19 Petsinger; Julie Ann Electromagnetic shield to prevent surreptitious access to contactless smartcards
US20030132132A1 (en) * 2002-01-16 2003-07-17 Small George H Retractable identification holder and methods of using same
US7604176B2 (en) * 2004-05-20 2009-10-20 American Express Travel Related Services Company, Inc. Radio frequency fobs and methods of using the same
US7911355B2 (en) * 2006-04-04 2011-03-22 Infineon Technologies Ag Apparatus for storing and wirelessly transmitting data
US20080265039A1 (en) * 2007-04-27 2008-10-30 First Data Corporation Protected Contactless Card
US20120228168A1 (en) * 2011-03-08 2012-09-13 Michael William Kitchen Electromagnetic shielding carrying case for contactless smartcards and personal articles
US9125465B2 (en) * 2012-08-29 2015-09-08 Daniel Vern Beckley Wallet
US9135548B2 (en) * 2012-11-29 2015-09-15 Paypal, Inc. Portable mechanical switch for selective deactivation of radio frequency identification circuits

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20180027616A1 (en) * 2016-07-21 2018-01-25 Ut-Battelle, Llc Electromagnetic print nozzle for direct-write additive manufacturing with resistive renditions
CN106330230A (en) * 2016-11-11 2017-01-11 深圳天珑无线科技有限公司 Card protective circuit, neck, terminal and card protective method
US20180340838A1 (en) * 2017-05-23 2018-11-29 Barry Nicholson, JR. Temperature Measuring and Logging Slide
US10578495B2 (en) * 2017-05-23 2020-03-03 Barry Nicholson, JR. Temperature measuring and logging slide
US11378461B2 (en) * 2017-05-23 2022-07-05 Barry Nicholson, JR. Temperature measuring and logging slide utilizing WISP

Also Published As

Publication number Publication date
US20140146510A1 (en) 2014-05-29
US9572292B2 (en) 2017-02-14
US9135548B2 (en) 2015-09-15

Similar Documents

Publication Publication Date Title
US9572292B2 (en) Portable mechanical switch for selective deactivation of radio frequency identification circuits
US10083387B2 (en) Radio frequency identification activation
CN105518699A (en) Data protection based on user and gesture recognition
Tu et al. Critical risk considerations in auto-ID security: Barcode vs. RFID
Zeng et al. Responsible facial recognition and beyond
Ghag et al. A comprehensive study of google wallet as an NFC application
Kairinos The integration of biometrics and AI
Guers et al. Card skimming: a cybercrime by hackers
Chang A secure cloud-based payment model for m-commerce
Moon et al. Towards the advancement of cashless transaction: A security analysis of electronic payment systems
Mohite et al. RFID security issues
Alshammari et al. Exploring the adoption of physical security controls in smartphones
Ojugo et al. Social engineering detection model for mobile smartphone clients
Joshi et al. Role of cyber security in retail
Tiwari et al. Cyber security trend analysis: an Indian perspective
McBride et al. Security issues with contactless bank cards
Kour et al. Security Issues in e-Banking
Ulqinaku et al. Scan-and-pay on android is dangerous
Mahmood et al. Is RFID technology secure and private?
US9990574B2 (en) Holder for RFID enabled cards
Carmi et al. Mobile Security: a Review of New Advanced Technologies to Detect and Prevent E-Payment Mobile Frauds
Kobelev Big brother on a tiny chip: Ushering in the age of global surveillance through the use of radio frequency identification technology and the need for legislative response
Bhamidipati et al. A Novel Approach to Ensure Security and Privacy While Using QR Code Scanning in Business Applications
US20150027831A1 (en) Security lining
Caldwell Securing the point of sale

Legal Events

Date Code Title Description
AS Assignment

Owner name: PAYPAL, INC., CALIFORNIA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:EBAY INC.;REEL/FRAME:037496/0537

Effective date: 20150717

Owner name: EBAY INC., CALIFORNIA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:WILCZYNSKI, MATTHEW;REEL/FRAME:037496/0515

Effective date: 20121129

STCF Information on status: patent grant

Free format text: PATENTED CASE

MAFP Maintenance fee payment

Free format text: PAYMENT OF MAINTENANCE FEE, 4TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1551); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

Year of fee payment: 4